You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/multi-factor-authentication.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then
122
122
1. In the left menu, select **Users**.
123
123
1. Search for and select the user for which you want to delete TOTP authenticator app enrollment.
124
124
1. In the left menu, select **Authentication methods**.
125
-
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the 3-dot menu next to it. If you don't see this interface, select **Switch to the new user authentication methods experience! Click here to use it now** to switch to the new authentication methods experience.
125
+
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
126
126
1. Select **Delete**, and then select **Yes** to confirm.
@@ -137,4 +137,4 @@ Learn how to [delete a user's Software OATH token authentication method](/graph/
137
137
138
138
- Learn about the [TOTP display control](display-control-time-based-one-time-password.md) and [Azure AD MFA technical profile](multi-factor-auth-technical-profile.md)
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
title: Azure Active Directory recommendation - Integrate third party apps with Azure AD | Microsoft Docs
3
+
description: Learn why you should integrate third party apps with Azure AD
4
+
services: active-directory
5
+
documentationcenter: ''
6
+
author: MarkusVi
7
+
manager: karenhoran
8
+
editor: ''
9
+
10
+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11
+
ms.service: active-directory
12
+
ms.topic: reference
13
+
ms.tgt_pltfrm: na
14
+
ms.workload: identity
15
+
ms.subservice: report-monitor
16
+
ms.date: 03/02/2022
17
+
ms.author: markvi
18
+
ms.reviewer: hafowler
19
+
20
+
ms.collection: M365-identity-device-management
21
+
---
22
+
23
+
# Azure AD recommendation: Integrate your third party apps
24
+
25
+
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26
+
27
+
This article covers the recommendation to integrate third party apps.
28
+
29
+
30
+
## Description
31
+
32
+
As an Azure AD admin responsible for managing applications, you want to use the Azure AD security features with your third party apps. Integrating these apps into Azure AD enables:
33
+
34
+
- You to use one unified method to manage access to your third party apps.
35
+
- Your users to benefit from using single sign-on to access all your apps with a single password.
36
+
37
+
38
+
## Logic
39
+
40
+
If Azure AD determines that none of your users are using Azure AD to authenticate to your third party apps, this recommendation shows up.
41
+
42
+
## Value
43
+
44
+
Integrating third party apps with Azure AD allows you to use Azure AD's security features.
45
+
The integration:
46
+
- Improves the productivity of your users.
47
+
48
+
- Lowers your app management cost.
49
+
50
+
You can then add an extra security layer by using conditional access to control how your users can access your apps.
51
+
52
+
## Action plan
53
+
54
+
1. Review the configuration of your apps.
55
+
2. For each app that isn't integrated into Azure AD yet, verify whether an integration is possible.
56
+
57
+
58
+
## Next steps
59
+
60
+
-[Tutorials for integrating SaaS applications with Azure Active Directory](../saas-apps/tutorial-list.md)
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/how-to-dnsbind.md
+51-25Lines changed: 51 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: karenhoran
7
7
ms.service: active-directory
8
8
ms.topic: how-to
9
9
ms.subservice: verifiable-credentials
10
-
ms.date: 04/01/2021
10
+
ms.date: 02/22/2022
11
11
ms.author: barclayn
12
12
13
13
#Customer intent: Why are we doing this?
@@ -17,15 +17,9 @@ ms.author: barclayn
17
17
18
18
> [!IMPORTANT]
19
19
> Azure Active Directory Verifiable Credentials is currently in public preview.
20
-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20
+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
21
21
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
22
23
-
In this article:
24
-
> [!div class="checklist"]
25
-
> * Why do we need to link our DID to our domain?
26
-
> * How do we link DIDs and domains?
27
-
> * How does the domain linking process work?
28
-
> * How does the verify/unverified domain logic work?
29
23
30
24
## Prerequisites
31
25
@@ -35,16 +29,20 @@ To link your DID to your domain, you need to have completed the following.
35
29
36
30
## Why do we need to link our DID to our domain?
37
31
38
-
A DID starts out as an identifier that is not anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization does not know 'who' the DID belongs to, then the DID is not as useful.
32
+
A DID starts out as an identifier that isn't anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization doesn't know 'who' the DID belongs to, then the DID isn't as useful.
39
33
40
34
Linking a DID to a domain solves the initial trust problem by allowing any entity to cryptographically verify the relationship between a DID and a Domain.
41
35
36
+
## When do you need to update the domain in your DID?
37
+
38
+
In the event where the domain associated with your company changes, you would also need to change the domain in your DID document that is also published in the ION network. You can update the domain in your DID directly from the Azure AD Verifiable Credential portal.
39
+
42
40
## How do we link DIDs and domains?
43
41
44
-
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by including the domain information that you provided in your DID, and generating the well-known config file:
42
+
We follow the [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/) specification when creating the link. The verifiable credentials service links your DID and domain. The service includes the domain information that you provided in your DID, and generates the well-known config file:
45
43
46
44
1. Azure AD uses the domain information you provide during organization setup to write a Service Endpoint within the DID Document. All parties who interact with your DID can see the domain your DID proclaims to be associated with.
47
-
45
+
48
46
```json
49
47
"service": [
50
48
{
@@ -71,25 +69,25 @@ We make a link between a domain and a DID by implementing an open standard writt
71
69
}
72
70
```
73
71
74
-
After you have the well-known configuration file, you need to make the file available using the domain name you specified when enabling your AAD for verifiable credentials.
72
+
After you have the well-known configuration file, you need to make the file available using the domain name you specified when you enabled your Azure AD for verifiable credentials.
75
73
76
-
* Host the well-known DID configuration file at the root of the domain.
77
-
* Do not use redirects.
78
-
* Use https to distribute the configuration file.
74
+
- Host the well-known DID configuration file at the root of the domain.
75
+
- Don't use redirects.
76
+
- Use https to distribute the configuration file.
79
77
80
78
>[!IMPORTANT]
81
79
>Microsoft Authenticator does not honor redirects, the URL specified must be the final destination URL.
82
80
83
-
## User experience
81
+
## User experience in the wallet
84
82
85
-
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about organization and its DID. If the domain our verifiable credential wallet, Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
83
+
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about the organization and its DID. Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
86
84
87
85
## Verified domain
88
86
89
87
Before Microsoft Authenticator displays a **Verified** icon, a few things need to be true:
90
88
91
89
* The DID signing the self-issued open ID (SIOP) request must have a Service endpoint for Linked Domain.
92
-
* The root domain does not use a redirect and uses https.
90
+
* The root domain doesn't use a redirect and uses https.
93
91
* The domain listed in the DID Document has a resolvable well-known resource.
94
92
* The well-known resource's verifiable credential is signed with the same DID that was used to sign the SIOP that Microsoft Authenticator used to kick start the flow.
95
93
@@ -99,19 +97,47 @@ If all of the previously mentioned are true, then Microsoft Authenticator displa
99
97
100
98
## Unverified domain
101
99
102
-
If any of the above are not true, the Microsoft Authenticator will display a full page warning to the user that the domain is unverified, the user is in the middle of a risky transaction and they should proceed with caution. We have chosen to take this route because:
100
+
If any of the above aren't true, Microsoft Authenticator displays a full page warning to the user indicating that the domain is unverified. The user is warned that they are in the middle of a potential risky transaction and they should proceed with caution. We have chosen to take this route because:
103
101
104
102
* The DID is either not anchored to a domain.
105
-
* The configuration was not set up properly.
106
-
* The DID the user is interacting with is malicious and actually can't prove they own a domain (since they actually don't). Due to this last point, it is imperative that you link your DID to the domain the user is familiar with, to avoid propagating the warning message.
103
+
* The configuration wasn't set up properly.
104
+
* The DID that the user is interacting with could be malicious and actually can't prove that they own the domain linked.
105
+
106
+
It is of high importance that you link your DID to a domain recognizable to the user.
107
107
108
108

109
109
110
-
## Distribute well-known config
110
+
## How do you update the linked domain on your DID?
111
+
112
+
1. Navigate to the Verifiable Credentials | Getting Started page.
113
+
1. On the left side of the page select **Domain**.
114
+
1. In the Domain box, enter your new domain name.
115
+
1. Select **Publish**.
116
+
117
+
:::image type="content" source="media/how-to-dnsbind/publish-update-domain.png" alt-text="Choose the publish button so your changes become":::
118
+
119
+
It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
120
+
121
+
>[!NOTE]
122
+
>If your changes are successful you will need to [verify](#verified-domain) your newly added domain.
111
123
112
-
1. Navigate to the Settings page in Verifiable Credentials and choose **Verify this domain**
113
124
114
-

125
+
:::image type="content" source="media/how-to-dnsbind/verification.png" alt-text="You need to verify your domain once that the publishing process completes":::
126
+
127
+
### Do I need to wait for my DID Doc to be updated to verify my newly added domains?
128
+
129
+
Yes. You need to wait until the config.json file gets updated before you publish it using your domain's hosting location.
130
+
131
+
### How do I know when the linked domain update has successfully completed?
132
+
133
+
Once the domain changes are publised to ION, the domain section inside the Azure AD Verifiable Credentials service will display `Published` as the status and you should be able to make new changes to the domain.
134
+
135
+
>[!IMPORTANT]
136
+
> No changes to your domain are possible while publishing is in progress.
137
+
138
+
## Distribute well-known config
139
+
140
+
1. From the Azure portal, navigate to the Verifiable Credentials page. Select **Domain** and choose **Verify this domain**
115
141
116
142
2. Download the did-configuration.json file shown in the image below.
117
143
@@ -132,4 +158,4 @@ Congratulations, you now have bootstrapped the web of trust with your DID!
132
158
133
159
## Next steps
134
160
135
-
If during onboarding you enter the wrong domain information or if you decide to change it, you will need to [opt out](how-to-opt-out.md). At this time, we don't support updating your DID document. Opting out and opting back in will create a brand new DID.
161
+
- [How to customize your Azure Active Directory Verifiable Credentials](credential-design.md)
0 commit comments